<  Retour au portail Polytechnique Montréal

Documents publiés en "2013"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | C | E | F | G | H | J | M | P | S | T
Nombre de documents: 28

A

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., Pinto, M., & Fuentes, L. (décembre 2013). Security Aspects: A Framework for Enforcement of Security Policies Using AOP [Communication écrite]. International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan. Lien externe

B

Barhamgi, M., Benslimane, D., Amghar, Y., Boulahia Cuppens, N., & Cuppens, F. (mars 2013). PrivComp: a privacy-aware data service composition system [Communication écrite]. 16th International Conference on Extending Database Technology (EDBT 2013), Genoa, Italy. Lien externe

Barhamgi, M., Benslimane, D., Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., Mrissa, M., & Taktak, H. (juin 2013). Secure and Privacy-Preserving Execution Model for Data Services [Communication écrite]. 25th International Conference on Advanced Information Systems Engineering (CAiSE 2013), Valencia, Spain. Lien externe

Benslimane, D., Barhamgi, M., Cuppens, F., Morvan, F., Defude, B., Nageba, E., Paulus, F., Morucci, S., Mrissa, M., Boulahia Cuppens, N., Ghedira, C., Mokadem, R., Oulmakhzoune, S., & Fayn, J. (2013). PAIRSE: a privacy-preserving service-oriented data integration system. ACM SIGMOD Record, 42(3), 42-47. Lien externe

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Fernandez, J. M. (mars 2013). Confidentiality-preserving query execution of fragmented outsourced data [Communication écrite]. International Conference on Information and Communication Technology (ICT-EurAsia 2013), Yogyakarta, Indonesia. Lien externe

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., Fernandez, J. M., & Gross-Amblard, D. (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 4(2), 39-62. Lien externe

C

Coatrieux, G., Pan, W., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2013). Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. IEEE Transactions on Information Forensics and Security, 8(1), 111-120. Lien externe

Cuppens, F., Boulahia Cuppens, N., & Elrakaiby, Y. (2013). Formal specification and management of security policies with collective group obligations. Journal of Computer Security, 21(1), 149-190. Lien externe

Cuppens, F., Boulahia Cuppens, N., Ben-Ghorbel-Talbi, M., Morucci, S., & Essaouini, N. (2013). Smatch: Formal dynamic session management model for RBAC. Journal of Information Security and Applications, 18(1), 30-44. Lien externe

E

Essaouini, N., Cuppens, F., Boulahia Cuppens, N., & Kalam, A. A. E. (septembre 2013). Conflict Management in Obligation with Deadline Policies [Communication écrite]. International Conference on Availability, Reliability and Security, Regensburg, Germany. Lien externe

F

Fourcot, F., Toutain, L., Köpsell, S., Cuppens, F., & Boulahia Cuppens, N. (août 2013). IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices [Communication écrite]. 19th EUNICE/IFIP WG 6.6 International Workshop on Advances in Communication Networking, Chemnitz, Germany. Lien externe

Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (septembre 2013). Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation [Communication écrite]. 9th International Workshop on Security and Trust Management (STM 2013), Egham, UK. Lien externe

G

García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., Miri, A., & Tawbi, N. (édit.) (2013). 5th International Symposium on Foundations and Practice of Security (FPS 2012), Montreal, QC, Canada. Lien externe

García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., Perez, S. M., & Cabot, J. (2013). Management of stateful firewall misconfiguration. Computers & Security, 39, 64-85. Lien externe

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (décembre 2013). Formal Characterization of Illegal Control Flow in Android System [Communication écrite]. International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan. Lien externe

H

Hachana, S., Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2013). Semantic analysis of role mining results and shadowed roles detection. Information Security Technical Report, 17(4), 131-147. Lien externe

Hachana, S., Cuppens, F., Boulahia Cuppens, N., Atluri, V., & Morucci, S. (décembre 2013). Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management [Communication écrite]. 9th International Conference on Information Systems Security (ICISS 2013), Kolkata, India. Lien externe

J

Justus, B., Cuppens, F., Boulahia Cuppens, N., Bringer, J., Chabanne, H., & Cipiere, O. (juillet 2013). Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective [Communication écrite]. 1st Annual Conference on Privacy, Security and Trust, Tarragona, Spain. Lien externe

Justus, B., Cuppens, F., Boulahia Cuppens, N., Bringer, J., Chabanne, H., & Cipiere, O. (juillet 2013). Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase [Communication écrite]. 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2013), Newark, NJ, USA. Lien externe

M

Moataz, T., Shikfa, A., Boulahia Cuppens, N., & Cuppens, F. (mai 2013). Semantic search over encrypted data [Communication écrite]. 20th International Conference on Telecommunications (ICT 2013), Casablanca, Morocco (5 pages). Lien externe

P

Papagiannakopoulou, E. I., Koukovini, M. N., Lioudakis, G. V., Dellas, N. L., García-Alfaro, J., Kaklamani, D. I., Venieris, I. S., Boulahia Cuppens, N., & Cuppens, F. (octobre 2013). Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model [Communication écrite]. 6th International Symposium on Foundations and Practice of Security (FPS 2013), La Rochelle, France. Lien externe

Papagiannakopoulou, E. I., Koukovini, M. N., Lioudakis, G. V., García-Alfaro, J., Kaklamani, D. I., Venieris, I. S., Cuppens, F., & Boulahia Cuppens, N. (2013). A privacy-aware access control model for distributed network monitoring. Computers & Electrical Engineering, 39(7), 2263-2281. Lien externe

Perez, S. M., Cosentino, V., Cabot, J., & Cuppens, F. (août 2013). Reverse Engineering of Database Security Policies [Communication écrite]. 24th International Conference on Database and Expert Systems Applications (DEXA 2013), Prague, Czech Republic. Lien externe

Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (septembre 2013). Model-Driven Extraction and Analysis of Network Security Policies [Communication écrite]. 16th International Conference on Model-Driven Engineering Languages and Systems (MODELS 2013), Miami, FL, USA. Lien externe

Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (juillet 2013). Towards an Access-Control Metamodel for Web Content Management Systems [Communication écrite]. CWE 2013 International Workshops, Aalborg, Denmark. Lien externe

S

Samarji, L., Cuppens, F., Boulahia Cuppens, N., Kanoun, W., & Dubus, S. (novembre 2013). Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks [Communication écrite]. 5th International Symposium on Cyberspace Safety and Security (CSS 2013), Zhangjiajie, China. Lien externe

T

Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (octobre 2013). Fine-grained privacy control for the RFID middleware of EPCglobal networks [Communication écrite]. 5th International Conference on Management of Emergent Digital EcoSystems (MEDES 2013), Luxembourg, Luxembourg. Lien externe

Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (octobre 2013). Privacy-enhanced filtering and collection middleware in EPCglobal networks [Communication écrite]. International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), La Rochelle, France (8 pages). Lien externe

Liste produite: Fri May 3 01:55:49 2024 EDT.